1) Run the latest upgrade_export utility to export the configuration2) Leave the exported - tgz file in %FWDIR\bin.3) Install the primary security Management Server on top of the current installation4) Run upgrade_import to Import the configuration.

1) Download the latest upgrade_export utility and run it from a \ temp directory to export theConfiguration.2) Transferee .tgz file to another network machine3) Uninstall allR75packages via Add/Remove Programs and reboot4) Install again using theR75CD ROM as a primary security management server5) Reboot and than transfer the .tgz file back to the local\ tem p6) Run upgcade_import to import the configuration.

1) Insert theR75CD-ROM. and select the option to export the configuration into a . tgz file2) Skip any upgrade verification warnings since you are not upgrading.3) Transfer the. tgz file to another networked machine.4) Download and run the cpclean utility and reboot.5) Use theR75CD_ROM to select the upgrade__import option to import the c

1) Download the latest upgrade_export utility and run it from a \ temp directory to export theConfiguration.2) Perform any requested upgrade verification suggested steps.3) Uninstall allR75packages via Add/Remove Programs and reboot4) Use smartUpdate to reinstall the Security Management server and reboot5) Transfer the .tgz file back to the local \ temp.6) Run upgrade_import to import the configuration.

Your primary Security Management Server runs on SecurePlatform. What is the easies...

Your R75 primary Security Management Server is installed on SecurePlatform. You plan to schedule theSecurity Management Server to run fw logswitch automatically every 48 hours. How do you create thisschedule?

Create a time object, and add 48 hours as the interval. Open the primary Security Management Serverobject's Logs and Masters window, enable Schedule log switch, and select the Time object.

On a SecurePlatform Security Management Server, this can only be accomplished by configuring the fwlogswitch command via the cron utility.

Create a time object, and add 48 hours as the interval. Open the Security Gateway object's Logs andMasters window, enable Schedule log switch, and select the Time object.

Create a time object, and add 48 hours as the interval. Select that time object's Global Properties >Logs and Masters window, to schedule a logswitch.

Which of the following methods will provide the most complete backup of an R75 con...

Your organization's disaster recovery plan needs an update to the backup and restore section to reap thebenefits of the new distributed R75 installation. Your plan must meet the following required and desiredobjectives:Required Objective: The Security Policy repository must be backed up no less frequently than every 24hours.Desired Objective: The R75 components that enforce the Security Polices should be blocked up atleast once a week.Desired Objective: Back up R75 logs at least once a weekYour disaster recovery plan is as follows:Use the cron utility to run the upgrade_ export command each night on the Security Management Servers.Configure the organization's routine backup software to back up the files created by the upgrade_ exportcommand.Configure the SecurePlatform backup utility to back up the Security Gateways every Saturday nightUse the cron utility to run the upgrade export: command each Saturday niqht on the log serversConfigure an automatic, nightly loqswitchConfigure the organization's routine backup software to back up the switched logs every nightUpon evaluation, your plan:

Meets the required objective but does not meet either desired objective.

Meets the required objective and both desired objectives.

Does not meet the required objective.

Meets the required objective and only one desired objective.

Your company is running Security Management Server R75 on SecurePlatform, which ha...

What information is provided from the options in this screenshot?(i)Whether a SIC certificate was generated for the Gateway(ii)Whether the operating system is SecurePlatform or SecurePlatform Pro(iii)Whether this is a standalone or distributed installation

(i), (ii) and (iii)

(ii) and (iii)

(i) and (iii)

(i) and (ii)

Peter is your new Security Administrator. On his first working day, he is very ner...

Peter is your new Security Administrator. On his first working day, he is very nervous and sets the wrongpassword three times. His account is locked. What can be done to unlock Peter's account? Give the BESTanswer.

You can unlock Peter's account by using the command fwm unlock_admin -u Peter on the SecurityGateway.

You can unlock Peter's account by using the command fwm unlock_admin -u Peter on the SecurityManagement Server.

It is not possible to unlock Peter's account. You have to install the firewall once again or abstain fromPeter's help.

You can unlock Peter's account by using the command fwm lock_admin -u Peter on the SecurityManagement Server.

Which CLI command verifies the number of cores on your firewall machine?

John currently administers a network using NGX R65.4 on the Security Management Server and NGXR65.2.100 (the VOIP release with the VOIP plug-ins enabled). He wants to upgrade to R75 to get thebenefits of Check Point's Software Blades. What would be the best way of doing this?

This can not be done yet asR75can not manage NGX R65 Gateways due to SmartDefense and IPSmismatch problems.

This is not supported today as currently the VOIP Software Blade and VOIP plug-in is not availableinR75.

Run upgrade_export on R65 management, then installR75on this machine and run upgrade_import andre-license the systems to use software blades.

Just insert theR75CD-ROM and run the in-place upgrade.

John currently administers a network using single CPU single core servers for the ...

John currently administers a network using single CPU single core servers for the Security Gateways and isrunning R75. His company is now going to implement VOIP and needs more performance on theGateways. He is now adding more memory to the systems and also upgrades the CPU to a modern quadcore CPU in the server. He wants to use CoreXL technology to benefitfrom the new performance benchmarks of this technology. How can he achieve this?

Nothing needs to be done. SecurePlatform recognized the change during reboot and adjusted all thesettings automatically.

He just needs to go to cpconfig on the CLI and enable CoreXL. After the required reboot he will benefitfrom the new technology.

He just needs to go to cpconfig on the CLI and enable CoreXL. Only a restart of the firewall is requiredto benefit from CoreXL technology.

He needs to reinstall the Gateways because during the initial installation, it was a single-core CPU butthe wrong Linux kernel was installed. There is no other upgrade path available.

You are running a R75 Security Gateway on SecurePlatform. In case of a hardware fa...

You are running a R75 Security Gateway on SecurePlatform. In case of a hardware failure, you have aserver with the exact same hardware and firewall version installed. What backup method could be used toquickly put the secondary firewall into production?

upgrade_export

backup

manual backup

snapshot

Before upgrading SecurePlatform, you should create a backup. To save time, many ad...

Before upgrading SecurePlatform, you should create a backup. To save time, many administrators use thecommand backup. This creates a backup of the Check Point configuration as well as the systemconfiguration.An administrator has installed the latest HFA on the system for fixing traffic problem after creating a backupfile. There is a mistake in the very complex static routing configuration. The Check Point configuration hasnot been changed. Can the administrator use a restore to fix the errors in static routing?

The restore can be done easily by the command restore and selecting the appropriate backup file.

The restore is done by selecting Snapshot Management from the boot menu of SecurePlatform.

A backup cannot be restored, because the binary files are missing.

The restore is not possible because the backup file does not have the same build number (version).

Which operating systems are supported by a Check Point Security Gateway on an open...